首页 > 最新文献

Computer Law & Security Review最新文献

英文 中文
Privacy in Chinese iOS apps and impact of the personal information protection law 中国 iOS 应用程序中的隐私问题及个人信息保护法的影响
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-08-30 DOI: 10.1016/j.clsr.2024.106041
Konrad Kollnig , Lu Zhang , Jun Zhao , Nigel Shadbolt

Privacy in apps is a topic of widespread interest because many apps collect and share large amounts of highly sensitive information. In response, the Chinese legislator introduced a range of new data protection laws over recent years, notably the Personal Information Protection Law (PIPL) in 2021. So far, there exists limited research on the impacts of these new laws on apps’ privacy practices. To address this gap, this paper analyses data collection in pairs of 634 Chinese iOS apps, one version from early 2020 and one from late 2021.

Our work finds that many more apps now implement consent. Yet, those end-users that decline consent will often be forced to exit the app. Fewer apps now collect data without consent but many still integrate tracking libraries. Market concentration in app data collection has seen limited change. At the same time, there exists a larger number of influential and equal market participants than in the West. Among them, Apple was the only relevant foreign company.

We see our findings characteristic of a first iteration at Chinese data regulation with room for improvement. With the help of enhanced technological capabilities, we expect increased enforcement of the new data rules. There is also room to refine the new laws and make them more targeted at mobile apps and the online sphere, particularly through clear and up-to-date technical specifications for software developers. As such, our findings could also be motivation for non-Chinese policy- and lawmakers to enhance their own data protection regimes.

由于许多应用程序会收集和共享大量高度敏感的信息,因此应用程序中的隐私问题是一个广受关注的话题。为此,中国立法机构近年来出台了一系列新的数据保护法律,特别是 2021 年颁布的《个人信息保护法》(PIPL)。迄今为止,有关这些新法律对应用程序隐私保护实践的影响的研究十分有限。为了填补这一空白,本文分析了 634 款中国 iOS 应用程序的数据收集情况,其中一款是 2020 年初的版本,另一款是 2021 年末的版本。然而,那些拒绝同意的最终用户往往会被迫退出应用程序。现在未经同意收集数据的应用程序越来越少,但仍有许多应用程序集成了跟踪库。应用程序数据收集的市场集中度变化有限。与此同时,与西方国家相比,有影响力的平等市场参与者数量更多。我们认为,我们的研究结果是中国数据监管的第一次迭代,还有改进的余地。随着技术能力的增强,我们预计新数据规则的执行力度会加大。此外,新法律还有改进的余地,尤其是通过为软件开发商提供清晰、最新的技术规范,使其更有针对性地适用于移动应用程序和网络领域。因此,我们的研究结果也可激励非中国的政策和立法者加强本国的数据保护制度。
{"title":"Privacy in Chinese iOS apps and impact of the personal information protection law","authors":"Konrad Kollnig ,&nbsp;Lu Zhang ,&nbsp;Jun Zhao ,&nbsp;Nigel Shadbolt","doi":"10.1016/j.clsr.2024.106041","DOIUrl":"10.1016/j.clsr.2024.106041","url":null,"abstract":"<div><p>Privacy in apps is a topic of widespread interest because many apps collect and share large amounts of highly sensitive information. In response, the Chinese legislator introduced a range of new data protection laws over recent years, notably the Personal Information Protection Law (PIPL) in 2021. So far, there exists limited research on the impacts of these new laws on apps’ privacy practices. To address this gap, this paper analyses data collection in pairs of 634 Chinese iOS apps, one version from early 2020 and one from late 2021.</p><p>Our work finds that many more apps now implement consent. Yet, those end-users that decline consent will often be forced to exit the app. Fewer apps now collect data without consent but many still integrate tracking libraries. Market concentration in app data collection has seen limited change. At the same time, there exists a larger number of influential and equal market participants than in the West. Among them, Apple was the only relevant foreign company.</p><p>We see our findings characteristic of a <em>first iteration</em> at Chinese data regulation with room for improvement. With the help of enhanced technological capabilities, we expect increased enforcement of the new data rules. There is also room to refine the new laws and make them more targeted at mobile apps and the online sphere, particularly through clear and up-to-date technical specifications for software developers. As such, our findings could also be motivation for non-Chinese policy- and lawmakers to enhance their own data protection regimes.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"55 ","pages":"Article 106041"},"PeriodicalIF":3.3,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924001079/pdfft?md5=f35185751c76a76e671e0f0e5d8cac53&pid=1-s2.0-S0267364924001079-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142098442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Royalty rate determination in standard essential patent litigation in China - from regional rate to global rate 中国标准必要专利诉讼中的专利费率确定--从区域费率到全球费率
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-08-27 DOI: 10.1016/j.clsr.2024.106036
Ying Liu

Standard essential patent (SEP)-related disputes frequently involve parallel litigation cases in various jurisdictions in the world. With the rapid advancement of the telecommunication industry, Chinese companies are more and more embroiled in such global dispute, particularly with the issue of fair, reasonable, and non-discriminatory (FRAND) rate determination by the courts. Chinese courts are actively asserting jurisdiction over global FRAND disputes. It is important to note that within the framework of Chinese court practice, the court should further improve its trial procedures to ensure that parties have reasonable expectations regarding rate determination result on the merits and the procedural due process. This article reviews the judicial practice in China regarding the cases of FRAND rate dispute, summarizing the characteristics and recent development in the court practice. The article outlines how Chinese courts apply comparable license and top-down approach to calculate the FRAND rate. Notably, Chinese courts have taken a more flexible and pragmatic approach when addressing this issue, tailoring their decisions based on the circumstances in individual case. Additionally, it discusses the possibility of Article 24 in the Judicial Interpretation II as the legal basis for determining the global FRAND rate, as well as how the requirement for good-faith negotiation is interpreted by the court and whether the regional discount is reasonable in the context of the global FRAND rate. Consequently, the article argues that the courts should consider harmonizing its practice with prevailing norms in international jurisdictions. Several recommendations for optimizing the trial procedure also proposed, thereby ensuring scientific rigor and transparency of the rate calculation.

与标准必要专利(SEP)相关的纠纷经常涉及全球不同司法管辖区的平行诉讼案件。随着电信行业的快速发展,中国企业越来越多地卷入此类全球纠纷,特别是法院在公平、合理和非歧视(FRAND)费率确定方面的问题。中国法院正在积极主张对全球 FRAND 争议的管辖权。值得注意的是,在中国法院实践的框架下,法院应进一步完善审判程序,以确保当事人对费率确定结果的是非曲直和程序正当性有合理的预期。本文回顾了中国有关 FRAND 费率纠纷案件的司法实践,总结了法院实践的特点和最新发展。文章概述了中国法院如何运用可比许可和自上而下的方法来计算 FRAND 费率。值得注意的是,中国法院在处理这一问题时采取了更加灵活和务实的方法,根据个案的具体情况做出了相应的判决。此外,文章还讨论了《司法解释二》第 24 条作为确定全球 FRAND 费率的法律依据的可能性,以及法院如何解释善意谈判的要求和在全球 FRAND 费率的背景下区域折扣是否合理的问题。因此,文章认为法院应考虑将其实践与国际司法管辖区的现行规范相协调。文章还提出了优化审判程序的若干建议,从而确保费率计算的科学性和透明度。
{"title":"Royalty rate determination in standard essential patent litigation in China - from regional rate to global rate","authors":"Ying Liu","doi":"10.1016/j.clsr.2024.106036","DOIUrl":"10.1016/j.clsr.2024.106036","url":null,"abstract":"<div><p>Standard essential patent (SEP)-related disputes frequently involve parallel litigation cases in various jurisdictions in the world. With the rapid advancement of the telecommunication industry, Chinese companies are more and more embroiled in such global dispute, particularly with the issue of fair, reasonable, and non-discriminatory (FRAND) rate determination by the courts. Chinese courts are actively asserting jurisdiction over global FRAND disputes. It is important to note that within the framework of Chinese court practice, the court should further improve its trial procedures to ensure that parties have reasonable expectations regarding rate determination result on the merits and the procedural due process. This article reviews the judicial practice in China regarding the cases of FRAND rate dispute, summarizing the characteristics and recent development in the court practice. The article outlines how Chinese courts apply comparable license and top-down approach to calculate the FRAND rate. Notably, Chinese courts have taken a more flexible and pragmatic approach when addressing this issue, tailoring their decisions based on the circumstances in individual case. Additionally, it discusses the possibility of Article 24 in the Judicial Interpretation II as the legal basis for determining the global FRAND rate, as well as how the requirement for good-faith negotiation is interpreted by the court and whether the regional discount is reasonable in the context of the global FRAND rate. Consequently, the article argues that the courts should consider harmonizing its practice with prevailing norms in international jurisdictions. Several recommendations for optimizing the trial procedure also proposed, thereby ensuring scientific rigor and transparency of the rate calculation.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"55 ","pages":"Article 106036"},"PeriodicalIF":3.3,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142084325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intimate harms and menstrual cycle tracking apps 亲密伤害与月经周期跟踪应用程序
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-08-25 DOI: 10.1016/j.clsr.2024.106038
Eliza Hammond , Mark Burdon

Menstrual cycle tracking applications (‘apps’) are smartphone or tablet apps that allow users to log data pertaining to their period. Using a lens of privacy focussed on intimacy, it will be argued that the control-based harms and intimate harms emerging from these apps require moving from an information privacy law model based on control to one that acknowledges the deeper connection between intimacy and privacy. We examine the privacy policies of 20 menstrual cycle tracking apps to investigate how the control-based protections of the Privacy Act apply. Our findings demonstrate that there are many deficiencies in app privacy policies which give rise to critical questioning about the application of the Australian Privacy Act’s control approach. We argue that the current gender-agnostic approach of information privacy law's control approach does not adequately protect app users and their intimate information. Intimate harms rethink the application of information privacy law by extending its reach beyond the traditional control harms contemplated by the Act and examine how menstrual cycle tracking apps disrupt users’ intimate spheres and relationships. To adequately protect app users from these deeper intimate harms, we contend that information privacy law moves beyond the procedural-based control approach to an information privacy model that is relational, context-dependant and acknowledges the connection between intimacy and privacy.

月经周期跟踪应用程序("应用程序")是智能手机或平板电脑应用程序,允许用户记录与其月经有关的数据。我们将从以亲密关系为重点的隐私角度出发,论证这些应用程序所产生的基于控制的伤害和亲密关系的伤害,需要从基于控制的信息隐私法模式转向承认亲密关系与隐私之间更深层次联系的模式。我们研究了 20 款月经周期跟踪应用程序的隐私政策,以调查《隐私法》中基于控制的保护措施是如何适用的。我们的研究结果表明,应用程序隐私政策中存在许多缺陷,这些缺陷引发了对《澳大利亚隐私法案》控制方法应用的批判性质疑。我们认为,当前信息隐私法的控制方法与性别无关,不能充分保护应用程序用户及其隐私信息。私密伤害重新思考了信息隐私法的应用,将其适用范围扩展到该法所考虑的传统控制伤害之外,并研究了月经周期跟踪应用程序是如何破坏用户的私密领域和关系的。为了充分保护应用程序用户免受这些更深层次的亲密伤害,我们认为信息隐私法应超越基于程序的控制方法,转而采用一种关系性的、依赖于情境的信息隐私模式,并承认亲密关系与隐私之间的联系。
{"title":"Intimate harms and menstrual cycle tracking apps","authors":"Eliza Hammond ,&nbsp;Mark Burdon","doi":"10.1016/j.clsr.2024.106038","DOIUrl":"10.1016/j.clsr.2024.106038","url":null,"abstract":"<div><p>Menstrual cycle tracking applications (‘apps’) are smartphone or tablet apps that allow users to log data pertaining to their period. Using a lens of privacy focussed on intimacy, it will be argued that the control-based harms and intimate harms emerging from these apps require moving from an information privacy law model based on control to one that acknowledges the deeper connection between intimacy and privacy. We examine the privacy policies of 20 menstrual cycle tracking apps to investigate how the control-based protections of the <em>Privacy Act</em> apply. Our findings demonstrate that there are many deficiencies in app privacy policies which give rise to critical questioning about the application of the Australian <em>Privacy Act</em>’s control approach. We argue that the current gender-agnostic approach of information privacy law's control approach does not adequately protect app users and their intimate information. Intimate harms rethink the application of information privacy law by extending its reach beyond the traditional control harms contemplated by the Act and examine how menstrual cycle tracking apps disrupt users’ intimate spheres and relationships. To adequately protect app users from these deeper intimate harms, we contend that information privacy law moves beyond the procedural-based control approach to an information privacy model that is relational, context-dependant and acknowledges the connection between intimacy and privacy.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"55 ","pages":"Article 106038"},"PeriodicalIF":3.3,"publicationDate":"2024-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924001043/pdfft?md5=ef3c5c5487d951d388eb520e484e8f87&pid=1-s2.0-S0267364924001043-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142083888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The New F-word: The case of fragmentation in Dutch cybersecurity governance 新的 "F "字:荷兰网络安全治理各自为政的情况
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-08-23 DOI: 10.1016/j.clsr.2024.106032
Parto Mirzaei , Els De Busser

The fragmentation of the Dutch cybersecurity government landscape is a widely discussed phenomenon among politicians, policy makers, and cybersecurity specialists. Remarkably though, a negative narrative is underlying the idea of fragmentation, suggesting that we are dealing with a serious problem. A problem that has the potential of impeding cybersecurity governance in the Netherlands. This research zooms in on how cybersecurity governance is organised within the central government, and which organisations are concerned with the creation, implementation, and oversight of cybersecurity policies vis à vis Dutch society. This article provides an overview of all central government organisations (de Rijksoverheid) that are involved in cybersecurity governance on a strategic level. This research provides the first step in doctoral research into the possible implications of the fragmentation of cybersecurity governance in the Dutch central government, and how this fragmentation could potentially impact policy creation, implementation, and oversight. Based on the mapping of this governance landscape, it set out to measure fragmentation based on the number of units or organisations that are concerned with cybersecurity governance in the central government on a strategic level. This study has found that based on Boyne's (1992) notion of fragmentation and the Dutch governments’ definition of tiers, the Dutch cybersecurity governance landscape could indeed, when meticulously following Boyne's counting procedure, be regarded as fragmented.

荷兰网络安全政府格局的分散是政治家、政策制定者和网络安全专家广泛讨论的一个现象。但值得注意的是,分散的概念背后隐藏着一种消极的说法,表明我们正在处理一个严重的问题。这个问题有可能阻碍荷兰的网络安全治理。本研究深入探讨了中央政府内部如何组织网络安全治理,以及哪些组织负责制定、实施和监督荷兰社会的网络安全政策。本文概述了在战略层面参与网络安全治理的所有中央政府组织(de Rijksoverheid)。这项研究为博士研究迈出了第一步,研究荷兰中央政府网络安全治理分散可能带来的影响,以及这种分散如何对政策制定、实施和监督产生潜在影响。在绘制治理图的基础上,本研究根据中央政府中与网络安全治理相关的战略层面的单位或组织的数量来衡量碎片化程度。本研究发现,根据 Boyne(1992 年)的分散概念和荷兰政府对层级的定义,如果严格按照 Boyne 的计算程序,荷兰的网络安全治理格局确实可以被视为分散的。
{"title":"The New F-word: The case of fragmentation in Dutch cybersecurity governance","authors":"Parto Mirzaei ,&nbsp;Els De Busser","doi":"10.1016/j.clsr.2024.106032","DOIUrl":"10.1016/j.clsr.2024.106032","url":null,"abstract":"<div><p>The fragmentation of the Dutch cybersecurity government landscape is a widely discussed phenomenon among politicians, policy makers, and cybersecurity specialists. Remarkably though, a negative narrative is underlying the idea of fragmentation, suggesting that we are dealing with a serious problem. A problem that has the potential of impeding cybersecurity governance in the Netherlands. This research zooms in on how cybersecurity governance is organised within the central government, and which organisations are concerned with the creation, implementation, and oversight of cybersecurity policies vis à vis Dutch society. This article provides an overview of all central government organisations (de Rijksoverheid) that are involved in cybersecurity governance on a strategic level. This research provides the first step in doctoral research into the possible implications of the fragmentation of cybersecurity governance in the Dutch central government, and how this fragmentation could potentially impact policy creation, implementation, and oversight. Based on the mapping of this governance landscape, it set out to measure fragmentation based on the number of units or organisations that are concerned with cybersecurity governance in the central government on a strategic level. This study has found that based on Boyne's (1992) notion of fragmentation and the Dutch governments’ definition of tiers, the Dutch cybersecurity governance landscape could indeed, when meticulously following Boyne's counting procedure, be regarded as fragmented.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"55 ","pages":"Article 106032"},"PeriodicalIF":3.3,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924000980/pdfft?md5=cfd502acd03879bbdbfa116b7b4cecac&pid=1-s2.0-S0267364924000980-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142084326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Operational Technology resilience in the 2023 draft delegated act on cybersecurity for the power sector—An EU policy process analysis 2023 年电力行业网络安全委托法案草案中的运行技术恢复能力--欧盟政策流程分析
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-08-19 DOI: 10.1016/j.clsr.2024.106034
Øyvind Toftegaard , Guro Grøtterud , Bernhard Hämmerli
<div><p>The EU’s 2020 Cybersecurity Strategy promotes cybersecurity as essential for building a resilient, green, and digital Europe. Cleaner energy sources such as wind and solar are more volatile and thus need digital integration with Industrial Control Systems (ICS) for grid balancing. However, the digitization and the properties of cyberspace provide the ability to coordinate disruptive cyberattacks against power grid infrastructures. Digital weapons may be launched against ICS to start multiple cascading outages with a keystroke, causing large-scale blackouts we have never seen before. To reduce risk, the EU’s Strategy describes three objectives for ICS: Secure-by-design, resilient, and timely patched. In the strategy, the European Commission suggests a ”network code,” i.e. a delegated act for the electric power sector, setting rules for cybersecurity in cross-border electricity flows. The draft delegated act of November 2023 presents security requirements for Information and Communication Technology (ICT) and Network and Information Systems (NIS). Although ICS systems are used directly to manage electricity flows, ICS is only mentioned in one of the delegated act’s recitals as a subcategory of ICT products. Suppose Information Technology (IT) rather than Operational Technology (OT) is the focus of the delegated act. In that case, policymakers may not fulfill the EU cybersecurity strategy’s ICS objectives, thus failing to improve the resilience of power grid infrastructures and cross-border electricity flows. This study is a policy process analysis, and its contribution is threefold. First, a literature review is conducted to understand the extent to which the delegated act covers OT. Second, a framework condition analysis is applied to understand why the delegated act lacks OT-specific security requirements. Third, the analysis is extended to understand whether OT is sufficiently covered to achieve the EU strategy’s ICS objectives. In conclusion, our analysis shows a strong intention to include OT-specific security in the preparatory work of the delegated act, but that a stronger position of the IT communities forced OT onto the sideline. Further, the study shows weak fulfillment of general secure-by-design principles and security patch management. These results indicate that OT coverage in the delegated act is not in line with the expectations of the EU’s cybersecurity strategy and the delegated act’s early preparatory work. Therefore, we have suggested three measures to increase OT resilience focus in the act: (a) Define the expressions NIS, ICT services, ICT processes, and ICT in general as umbrella terms that include OT, (b) The foreseen minimum and advanced cybersecurity controls should require OT-specific measures, including holistic secure-by-design principles and patch management covering all patching phases, (c) Develop an OT implementation guide for the delegated act. Our work can be used by policymakers to optimize cybersecurity
欧盟的 2020 年网络安全战略将网络安全视为建设弹性、绿色和数字化欧洲的关键。风能和太阳能等清洁能源更不稳定,因此需要与工业控制系统(ICS)进行数字化集成,以实现电网平衡。然而,网络空间的数字化和特性为协调针对电网基础设施的破坏性网络攻击提供了能力。针对 ICS 的数字武器可能会通过按键启动多个级联停电,造成我们从未见过的大规模停电。为了降低风险,欧盟的战略描述了 ICS 的三个目标:设计安全、弹性和及时修补。在该战略中,欧盟委员会建议制定 "网络法规",即电力部门的委托法案,为跨境电力流动的网络安全制定规则。2023 年 11 月的委托法案草案提出了信息和通信技术 (ICT) 以及网络和信息系统 (NIS) 的安全要求。虽然 ICS 系统直接用于管理电力流动,但 ICS 只作为 ICT 产品的一个子类别在委托法案的一个序言中被提及。假设授权法案的重点是信息技术(IT)而不是操作技术(OT)。在这种情况下,政策制定者可能无法实现欧盟网络安全战略的 ICS 目标,从而无法提高电网基础设施和跨境电力流动的弹性。本研究是一项政策过程分析,有三方面的贡献。首先,通过文献综述来了解授权法案在多大程度上涵盖了 OT。其次,运用框架条件分析来了解授权法案为何缺乏针对 OT 的安全要求。第三,对分析进行扩展,以了解 OT 是否被充分涵盖,从而实现欧盟战略的 ICS 目标。总之,我们的分析表明,在委托法案的准备工作中包含针对 OT 的安全要求的意图非常强烈,但 IT 界的强硬立场迫使 OT 被搁置一旁。此外,研究还表明,一般安全设计原则和安全补丁管理的执行情况较差。这些结果表明,授权法案中的 OT 覆盖范围不符合欧盟网络安全战略和授权法案早期准备工作的预期。因此,我们提出了三项措施,以增加法案中对 OT 弹性的关注:(a) 将 NIS、ICT 服务、ICT 流程和一般 ICT 定义为包括 OT 的总括术语;(b) 预见的最低和高级网络安全控制应要求采取针对 OT 的措施,包括整体安全设计原则和涵盖所有修补阶段的修补程序管理;(c) 为授权法案制定 OT 实施指南。政策制定者可利用我们的工作来优化网络安全政策流程,研究人员也可利用我们的工作来研究网络安全领域的社会技术差距。
{"title":"Operational Technology resilience in the 2023 draft delegated act on cybersecurity for the power sector—An EU policy process analysis","authors":"Øyvind Toftegaard ,&nbsp;Guro Grøtterud ,&nbsp;Bernhard Hämmerli","doi":"10.1016/j.clsr.2024.106034","DOIUrl":"10.1016/j.clsr.2024.106034","url":null,"abstract":"&lt;div&gt;&lt;p&gt;The EU’s 2020 Cybersecurity Strategy promotes cybersecurity as essential for building a resilient, green, and digital Europe. Cleaner energy sources such as wind and solar are more volatile and thus need digital integration with Industrial Control Systems (ICS) for grid balancing. However, the digitization and the properties of cyberspace provide the ability to coordinate disruptive cyberattacks against power grid infrastructures. Digital weapons may be launched against ICS to start multiple cascading outages with a keystroke, causing large-scale blackouts we have never seen before. To reduce risk, the EU’s Strategy describes three objectives for ICS: Secure-by-design, resilient, and timely patched. In the strategy, the European Commission suggests a ”network code,” i.e. a delegated act for the electric power sector, setting rules for cybersecurity in cross-border electricity flows. The draft delegated act of November 2023 presents security requirements for Information and Communication Technology (ICT) and Network and Information Systems (NIS). Although ICS systems are used directly to manage electricity flows, ICS is only mentioned in one of the delegated act’s recitals as a subcategory of ICT products. Suppose Information Technology (IT) rather than Operational Technology (OT) is the focus of the delegated act. In that case, policymakers may not fulfill the EU cybersecurity strategy’s ICS objectives, thus failing to improve the resilience of power grid infrastructures and cross-border electricity flows. This study is a policy process analysis, and its contribution is threefold. First, a literature review is conducted to understand the extent to which the delegated act covers OT. Second, a framework condition analysis is applied to understand why the delegated act lacks OT-specific security requirements. Third, the analysis is extended to understand whether OT is sufficiently covered to achieve the EU strategy’s ICS objectives. In conclusion, our analysis shows a strong intention to include OT-specific security in the preparatory work of the delegated act, but that a stronger position of the IT communities forced OT onto the sideline. Further, the study shows weak fulfillment of general secure-by-design principles and security patch management. These results indicate that OT coverage in the delegated act is not in line with the expectations of the EU’s cybersecurity strategy and the delegated act’s early preparatory work. Therefore, we have suggested three measures to increase OT resilience focus in the act: (a) Define the expressions NIS, ICT services, ICT processes, and ICT in general as umbrella terms that include OT, (b) The foreseen minimum and advanced cybersecurity controls should require OT-specific measures, including holistic secure-by-design principles and patch management covering all patching phases, (c) Develop an OT implementation guide for the delegated act. Our work can be used by policymakers to optimize cybersecurity ","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 106034"},"PeriodicalIF":3.3,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924001006/pdfft?md5=5e0c64e3d85ae578ddac4e98056a92a3&pid=1-s2.0-S0267364924001006-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142012809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pornography, sexual privacy and copyright 色情、性隐私和版权
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-08-19 DOI: 10.1016/j.clsr.2024.105990
Abhilash Nair, James Griffin

This article proposes a new paradigm in the consideration of privacy in pornographic works in copyright enforcement actions. It focuses particularly on attempts to threaten individuals with copyright infringement action based on a speculative invoicing model. We approach this issue from the perspective of the right to sexual privacy of alleged infringers, which, as we argue, is particularly pertinent for pornographic works. The courts in England and Wales have broadly recognised the role of individual privacy and embarrassment caused to alleged infringers in the leading cases of Golden Eye and subsequently in Mircom, but the law remains unclear with no real recognition of, or meaningful mechanisms in place to address, the underlying issues. The article points out that this is due to a fundamental lack of appreciation of sexual privacy at a conceptual level in the context of consumption of pornography in the internet age, and consequent failure to consider this in copyright enforcement proceedings. We argue that the law should achieve a balance between the right holder's interest and the sexual privacy of alleged infringers, and copyright enforcement actions need to be approached with this in mind. This calls for a fundamental reconceptualisation of the right to privacy, and we call upon the courts to recognise and balance the sexual privacy rights of the alleged infringers of copyright in pornographic works with the interests of the right holders in certain copyright enforcement actions to achieve fair and equitable outcomes.

本文提出了在版权执法行动中考虑色情作品隐私的新模式。文章尤其关注基于推测性发票模式威胁个人版权侵权诉讼的尝试。我们从被控侵权者性隐私权的角度切入这一问题,我们认为,这与色情作品尤为相关。英格兰和威尔士的法院在 "黄金眼 "案及随后的 "Mircom "案等主要案件中广泛承认了个人隐私的作用以及给被控侵权人造成的尴尬,但法律仍不明确,没有真正承认或建立有意义的机制来解决根本问题。文章指出,这是因为在互联网时代的色情消费背景下,从根本上缺乏对性隐私在概念层面上的理解,因此在版权执行程序中未能考虑到这一点。我们认为,法律应该在权利人的利益和被控侵权者的性隐私之间取得平衡,版权执法行动也需要考虑到这一点。这就需要从根本上重新认识隐私权,我们呼吁法院在某些版权执法行动中承认并平衡色情作品版权被控侵权者的性隐私权与权利人的利益,以实现公平公正的结果。
{"title":"Pornography, sexual privacy and copyright","authors":"Abhilash Nair,&nbsp;James Griffin","doi":"10.1016/j.clsr.2024.105990","DOIUrl":"10.1016/j.clsr.2024.105990","url":null,"abstract":"<div><p>This article proposes a new paradigm in the consideration of privacy in pornographic works in copyright enforcement actions. It focuses particularly on attempts to threaten individuals with copyright infringement action based on a speculative invoicing model. We approach this issue from the perspective of the right to sexual privacy of alleged infringers, which, as we argue, is particularly pertinent for pornographic works. The courts in England and Wales have broadly recognised the role of individual privacy and embarrassment caused to alleged infringers in the leading cases of <em>Golden Eye</em> and subsequently in <em>Mircom</em>, but the law remains unclear with no real recognition of, or meaningful mechanisms in place to address, the underlying issues. The article points out that this is due to a fundamental lack of appreciation of sexual privacy at a conceptual level in the context of consumption of pornography in the internet age, and consequent failure to consider this in copyright enforcement proceedings. We argue that the law should achieve a balance between the right holder's interest and the sexual privacy of alleged infringers, and copyright enforcement actions need to be approached with this in mind. This calls for a fundamental reconceptualisation of the right to privacy, and we call upon the courts to recognise and balance the sexual privacy rights of the alleged infringers of copyright in pornographic works with the interests of the right holders in certain copyright enforcement actions to achieve fair and equitable outcomes.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 105990"},"PeriodicalIF":3.3,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924000578/pdfft?md5=aeba3b57cc50d5148f6bc266d84d45b6&pid=1-s2.0-S0267364924000578-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142006412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How might the GDPR evolve? A question of politics, pace and punishment GDPR 如何演变?政治、速度和惩罚问题
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-08-17 DOI: 10.1016/j.clsr.2024.106033
Gerard Buckley , Tristan Caulfield , Ingolf Becker

The digital age has made personal data more valuable and less private. This paper explores the future of the European Union’s General Data Protection Regulation (GDPR) by imagining a range of challenging scenarios and how it might handle them. We analyse United States’, Chinese and European approaches (self-regulation, state control, arms-length regulators) and identify four key drivers shaping the future regulatory landscape: econopolitics, enforcement capacity, societal trust, and speed of technological development. These scenarios lead us to envision six resultant versions of GDPR, ranging from laxer protection than now to models empowering individuals and regulators. While our analysis suggests a minor update to the status quo GDPR is the most likely outcome, we argue a more robust implementation is necessary. This would entail meaningful penalties for non-compliance, harmonised enforcement, a positive case to counter the regulation-stifles-innovation narrative, defence of cross-border data rights, and proactive guidelines to address emerging technologies. Strengthening the GDPR’s effectiveness is crucial to ensure the digital age empowers individuals, not just information technology corporations and governments.

数字时代使个人数据变得更有价值,也更不私密。本文通过想象一系列具有挑战性的情景以及欧盟可能如何处理这些情景,探讨了欧盟《一般数据保护条例》(GDPR)的未来。我们分析了美国、中国和欧洲的方法(自我监管、国家控制、独立监管机构),并确定了塑造未来监管格局的四个关键驱动因素:经济政治、执法能力、社会信任和技术发展速度。这些情景让我们设想了 GDPR 的六种结果版本,从比现在更宽松的保护到赋予个人和监管机构权力的模式。虽然我们的分析表明,对 GDPR 现状进行小幅更新是最有可能的结果,但我们认为有必要进行更有力的实施。这就需要对违规行为进行有意义的处罚、统一执法、以正面案例反驳 "监管扼杀创新 "的说法、捍卫跨境数据权利,以及制定积极的指导方针来应对新兴技术。加强 GDPR 的有效性对于确保数字时代赋予个人而不仅仅是信息技术公司和政府权力至关重要。
{"title":"How might the GDPR evolve? A question of politics, pace and punishment","authors":"Gerard Buckley ,&nbsp;Tristan Caulfield ,&nbsp;Ingolf Becker","doi":"10.1016/j.clsr.2024.106033","DOIUrl":"10.1016/j.clsr.2024.106033","url":null,"abstract":"<div><p>The digital age has made personal data more valuable and less private. This paper explores the future of the European Union’s General Data Protection Regulation (GDPR) by imagining a range of challenging scenarios and how it might handle them. We analyse United States’, Chinese and European approaches (self-regulation, state control, arms-length regulators) and identify four key drivers shaping the future regulatory landscape: econopolitics, enforcement capacity, societal trust, and speed of technological development. These scenarios lead us to envision six resultant versions of GDPR, ranging from laxer protection than now to models empowering individuals and regulators. While our analysis suggests a minor update to the status quo GDPR is the most likely outcome, we argue a more robust implementation is necessary. This would entail meaningful penalties for non-compliance, harmonised enforcement, a positive case to counter the regulation-stifles-innovation narrative, defence of cross-border data rights, and proactive guidelines to address emerging technologies. Strengthening the GDPR’s effectiveness is crucial to ensure the digital age empowers individuals, not just information technology corporations and governments.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 106033"},"PeriodicalIF":3.3,"publicationDate":"2024-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924000992/pdfft?md5=0e110841ca9f0647a9535293139f5c91&pid=1-s2.0-S0267364924000992-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142001750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Harmonizing innovation and regulation: The EU Artificial Intelligence Act in the international trade context 协调创新与监管:国际贸易背景下的欧盟人工智能法案
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-08-15 DOI: 10.1016/j.clsr.2024.106028
Qiang REN , Jing DU

The European Union's Artificial Intelligence Act focuses on establishing harmonized rules across EU Member States so that AI systems are safe, transparent, and respectful of existing laws and fundamental rights. It introduces a risk-based regulatory approach, classifying AI applications by risk levels and imposing stringent compliance requirements on high-risk applications. The paper critically examines the Act's provisions, including its prohibitions on certain AI practices, requirements for high-risk AI systems, and mandates for transparency and human oversight. The paper examines the implications of the Act for international trade and technological regulation, particularly in the context of the World Trade Organization's Technical Barriers to Trade (TBT) Agreement. It addresses the Act's potential impact on developing countries, highlighting concerns that the Act's uniform standards could potentially exacerbate the digital divide and create barriers in global AI innovation and trade. The paper suggests incorporating flexibility and differential standards in the Act, enhancing technical assistance for developing countries, and advocating the EU's active participation in global standard-setting.

欧盟《人工智能法》的重点是在欧盟成员国之间建立统一的规则,使人工智能系统安全、透明,并尊重现有法律和基本权利。该法案引入了基于风险的监管方法,将人工智能应用按风险等级分类,并对高风险应用提出了严格的合规要求。本文批判性地研究了该法案的条款,包括对某些人工智能做法的禁止、对高风险人工智能系统的要求以及对透明度和人工监督的规定。本文探讨了该法案对国际贸易和技术监管的影响,特别是在世界贸易组织《技术性贸易壁垒协议》(TBT)的背景下。它探讨了该法案对发展中国家的潜在影响,强调了人们对该法案的统一标准可能会加剧数字鸿沟并在全球人工智能创新和贸易中制造壁垒的担忧。文件建议在该法案中纳入灵活性和差别标准,加强对发展中国家的技术援助,并倡导欧盟积极参与全球标准制定。
{"title":"Harmonizing innovation and regulation: The EU Artificial Intelligence Act in the international trade context","authors":"Qiang REN ,&nbsp;Jing DU","doi":"10.1016/j.clsr.2024.106028","DOIUrl":"10.1016/j.clsr.2024.106028","url":null,"abstract":"<div><p>The European Union's Artificial Intelligence Act focuses on establishing harmonized rules across EU Member States so that AI systems are safe, transparent, and respectful of existing laws and fundamental rights. It introduces a risk-based regulatory approach, classifying AI applications by risk levels and imposing stringent compliance requirements on high-risk applications. The paper critically examines the Act's provisions, including its prohibitions on certain AI practices, requirements for high-risk AI systems, and mandates for transparency and human oversight. The paper examines the implications of the Act for international trade and technological regulation, particularly in the context of the World Trade Organization's Technical Barriers to Trade (TBT) Agreement. It addresses the Act's potential impact on developing countries, highlighting concerns that the Act's uniform standards could potentially exacerbate the digital divide and create barriers in global AI innovation and trade. The paper suggests incorporating flexibility and differential standards in the Act, enhancing technical assistance for developing countries, and advocating the EU's active participation in global standard-setting.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 106028"},"PeriodicalIF":3.3,"publicationDate":"2024-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141991346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Fundamental Rights Impact Assessment (FRIA) in the AI Act: Roots, legal obligations and key elements for a model template AI 法案中的基本权利影响评估 (FRIA):根源、法律义务和示范模板的关键要素
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-08-14 DOI: 10.1016/j.clsr.2024.106020
Alessandro Mantelero

What is the context which gave rise to the obligation to carry out a Fundamental Rights Impact Assessment (FRIA) in the AI Act? How has assessment of the impact on fundamental rights been framed by the EU legislator in the AI Act? What methodological criteria should be followed in developing the FRIA? These are the three main research questions that this article aims to address, through both legal analysis of the relevant provisions of the AI Act and discussion of various possible models for assessment of the impact of AI on fundamental rights.

The overall objective of this article is to fill existing gaps in the theoretical and methodological elaboration of the FRIA, as outlined in the AI Act. In order to facilitate the future work of EU and national bodies and AI operators in placing this key tool for human-centric and trustworthy AI at the heart of the EU approach to AI design and development, this article outlines the main building blocks of a model template for the FRIA. While this proposal is consistent with the rationale and scope of the AI Act, it is also applicable beyond the cases listed in Article 27 and can serve as a blueprint for other national and international regulatory initiatives to ensure that AI is fully consistent with human rights.

促使《人工智能法》规定有义务进行基本权利影响评估(FRIA)的背景是什么?欧盟立法者在《人工智能法》中是如何规定对基本权利影响的评估的?在制定基本权利影响评估时应遵循哪些方法标准?本文旨在通过对《人工智能法》相关条款的法律分析以及对人工智能对基本权利影响的各种可能评估模式的讨论,解决这三个主要研究问题。为了促进欧盟和国家机构以及人工智能运营商未来的工作,将这一以人为本、值得信赖的人工智能关键工具置于欧盟人工智能设计和开发方法的核心,本文概述了 FRIA 模型模板的主要构件。虽然该建议符合《人工智能法》的原理和范围,但其适用范围也超出了第 27 条所列的情况,可作为其他国家和国际监管举措的蓝本,以确保人工智能完全符合人权。
{"title":"The Fundamental Rights Impact Assessment (FRIA) in the AI Act: Roots, legal obligations and key elements for a model template","authors":"Alessandro Mantelero","doi":"10.1016/j.clsr.2024.106020","DOIUrl":"10.1016/j.clsr.2024.106020","url":null,"abstract":"<div><p>What is the context which gave rise to the obligation to carry out a Fundamental Rights Impact Assessment (FRIA) in the AI Act? How has assessment of the impact on fundamental rights been framed by the EU legislator in the AI Act? What methodological criteria should be followed in developing the FRIA? These are the three main research questions that this article aims to address, through both legal analysis of the relevant provisions of the AI Act and discussion of various possible models for assessment of the impact of AI on fundamental rights.</p><p>The overall objective of this article is to fill existing gaps in the theoretical and methodological elaboration of the FRIA, as outlined in the AI Act. In order to facilitate the future work of EU and national bodies and AI operators in placing this key tool for human-centric and trustworthy AI at the heart of the EU approach to AI design and development, this article outlines the main building blocks of a model template for the FRIA. While this proposal is consistent with the rationale and scope of the AI Act, it is also applicable beyond the cases listed in Article 27 and can serve as a blueprint for other national and international regulatory initiatives to ensure that AI is fully consistent with human rights.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 106020"},"PeriodicalIF":3.3,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0267364924000864/pdfft?md5=8d7f252655f8baa66bbefaa915063643&pid=1-s2.0-S0267364924000864-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141991345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open government data in the Brazilian digital government: Enabling an SDG acceleration agenda 巴西数字政府中的开放式政府数据:推动可持续发展目标加速议程
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2024-08-07 DOI: 10.1016/j.clsr.2024.106029
Larissa Galdino de Magalhães Santos

Open Government Data (OGD) has evolved from the mere generation of public data to its active management, but the strategic evolution still needs to be explored. This article explores the intersection of government's digital transformation, the Sustainable Development Goals (SDGs), and the role of government open data initiatives. The study focuses on the Brazilian trajectory, employing the "data as a public good" approach to evaluate data governance and capabilities as facilitators of sustainable digital transformation. The GDB method aligns with the SDG Digital Acceleration agenda, providing insights into integrating data in society and digital transformation. The study concludes by indicating the need for more dialogue and synergy between data management and government strategies. It emphasizes integrating data management, privacy protection, transparency, and ethical considerations for sustainable impact.

开放式政府数据(OGD)已从单纯生成公共数据发展到积极管理公共数据,但其战略演变仍有待探索。本文探讨了政府数字化转型、可持续发展目标(SDGs)和政府开放数据计划的作用之间的交叉点。本研究以巴西的发展轨迹为重点,采用 "数据作为公共产品 "的方法来评估数据治理和能力对可持续数字化转型的促进作用。GDB 方法与可持续发展目标的 "数字加速 "议程相一致,为将数据融入社会和数字转型提供了见解。研究最后指出,数据管理和政府战略之间需要更多的对话和协同。它强调要整合数据管理、隐私保护、透明度和伦理考虑因素,以实现可持续影响。
{"title":"Open government data in the Brazilian digital government: Enabling an SDG acceleration agenda","authors":"Larissa Galdino de Magalhães Santos","doi":"10.1016/j.clsr.2024.106029","DOIUrl":"10.1016/j.clsr.2024.106029","url":null,"abstract":"<div><p>Open Government Data (OGD) has evolved from the mere generation of public data to its active management, but the strategic evolution still needs to be explored. This article explores the intersection of government's digital transformation, the Sustainable Development Goals (SDGs), and the role of government open data initiatives. The study focuses on the Brazilian trajectory, employing the \"data as a public good\" approach to evaluate data governance and capabilities as facilitators of sustainable digital transformation. The GDB method aligns with the SDG Digital Acceleration agenda, providing insights into integrating data in society and digital transformation. The study concludes by indicating the need for more dialogue and synergy between data management and government strategies. It emphasizes integrating data management, privacy protection, transparency, and ethical considerations for sustainable impact.</p></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"54 ","pages":"Article 106029"},"PeriodicalIF":3.3,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141953186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Law & Security Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1